Cloud computing technique allows the users to access cloud services dynamically over internet when data is needed. Cloud is majorly divided into two types, private cloud and public cloud, hybrid cloud. This paper discusses about implementing a private cloud using open source software's like eucalyptus, Maas/juju. This private cloud is
...

Document clustering or unsupervised document classification is an automated process of grouping documents with similar content. Document clustering is an important task in many information retrieval systems. Also document clustering algorithms can help in discovery of new and useful knowledge or novel class from the documents under analysis. This knowledge
...

Cloud computing is a model that enables convenient and on demand network access to a shared pool of configurable computing resources where millions of users share an infrastructure. Privacy and security is significant obstacle that is preventing the extensive adoption of the public cloud in the industry. Multi-tenancy where multiple
...

In software designing, every phase consumes some resources and some cost which is associated with these resources. In every case, the cost of software, vary with the development duration of the software. The most important work done by the project manager is to maintain the balance between time and cost
...

Cloud computing is technology defined as a computing system that deals with various services as IaaS, PaaS, SaaS and handles all resources which takes part in sharing. In cloud computing cloud storage is that storage where the data is retained in logical pools, the physical storage compasses multiple servers and
...

Cloud computing has come out to be an interesting and beneficial way of changing the whole computing Schedulers for cloud computing determine on which processing resource jobs of a workflow should be allocated. Scheduling theory for cloud computing is in advance a lot of awareness with increasing popularity in this
...

Data publishing is recently focused more for the data analysis. In recent days, the data creation is enormous in all the fields. Predictive analytics uses all the data collected from various sources for predicting the future even though there is uncertainty in information gathered. The data used for analysis should
...

SQL injection attacks pose a serious security threat to Web applications. This type of attack allows attackers to obtain unauthorized access to the databases underlying the applications and to the potentially sensitive information these databases contain. Although researchers and Security experts have proposed various methods to address the SQL injection
...

Mobile devices of today offload their compute intensive application to cloud, but also consume huge energy while communicating using mobile network services like 3G/4G. Cloudlets can be used to provide such services with wireless LANs. Worldwide Android becomes the fastest-growing mobile OS. Millions of new Android devices are activated worldwide
...

In this paper, proposes predicting student's academic failure using data mining techniques. Real time data of school or graduating students from an institute is taken and various data mining techniques (classification algorithms), such as induction rules, decision trees and naive Bayes are applied on it. The results of these algorithms
...